Access Manager

We were trying to hunt for a diagram that showed a combined, generic consolidated overview of Identity, Security, and Access Management that was slightly biased towards Micro Focus. After a few hours on Google, we gave up and created our own.

ScorpionSting
May 16, 2017
10:28 am
Reads:
277
Score:
5

If your digital assets are valuable…then they are vulnerable. For years, the infrastructure engineers have taken heed of this reality with the notion of a network security layer. For years this organized approach to serve as an outline from which a systematic plan is followed to maximize its services and especially security. The same value…

+ read more

Kent Purdy
May 7, 2017
10:51 pm
Reads:
247
Score:
Unrated

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
369
Score:
Unrated

Add this to the filter section of the Web.xml to enable HSTS.

May 4, 2017
5:08 pm
Reads:
315
Score:
Unrated

Most Access Manager deployments are virtualized. There are many advantages to virtualization but there are some disadvantages. The NetIQ documentation provides the basic guidance that you should ensure that the same resources that a physical machine would provide are available to your virtual machine. This article will discuss how to do that for memory. I’ll…

+ read more

Jerry Combs
Mar 31, 2017
3:59 pm
Reads:
606
Score:
5

Access Manager supports different external OAuth providers for social integration. Social Authentication simplifies login for end users and does not require maintaining large user stores. This authentication can be configured using the SocialAuthClass of Access Manager Identity provider. For more information…

By: VNeeraj
Feb 21, 2017
1:58 pm
Reads:
974
Score:
Unrated

One of the primary deployment use cases for any IDM customer is to provide a single sign-on access to the User Application for their users from outside the enterprise, mostly for the employees working remotely. In this case, no customer would want to give direct access to IDM URL or keep the IDM in…

Feb 7, 2017
11:25 am
Reads:
1,037
Score:
5

A common observation from our new NetIQ Access Manager customers is that they implemented it because of access fatigue, resulting from all the complexity of delivering a diverse set of services while keeping them secure. It’s often complex because the who, where and what of access continue to go through dramatic changes while IT’s mindset…

+ read more

Kent Purdy
Jan 16, 2017
7:25 pm
Reads:
587
Score:
Unrated

With the release of NetIQ Advanced Authentication Framework (AAF) 5.5, the AAF server can act as a SAML 2.0 Identity Provider where user credentials are validated. Any Service Provider that can talk SAML 2.0, such as the NetIQ Access Manager (NAM) server, can integrate with this so that users after having successfully authenticated with…

By: ncashell
Jan 4, 2017
5:00 pm
Reads:
1,066
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow